Unit 1 Lesson 2 Uploaded
Unit 1 Lesson 2 Uploaded
Lesson 2
ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE
Topics:
Online Safety and Security
Internet Threats
Netiquette / Protecting Reputations
Online
Copyright
Contextualized Online Search and
Research Skills
Learning Outcomes
At the end of this lesson, the students should be
able to:
1.2 WORMS- unlike a virus, goes to work on its own without attaching itself to files or programs.
It lives in your computer memory, doesn't damage or alter the hard drive and propagates by
sending itself to other computers in a network – whether within a company or the Internet itself.
1.3 TROJAN - a Trojan horse may not be a term you're familiar with, but there's a good chance
you or someone you know has been affected by one. It is disguised as, or embedded within,
legitimate software. It is an executable file that will install itself and run automatically once it's
downloaded.
1.4 SPYWARE & ADWARE - spyware and adware are often used by third parties to infiltrate
your computer. These are software that collects personal information about you without you
knowing. They often come in the form of a ‘free' download and are installed automatically with
or without your consent. These are difficult to remove and can infect your computer with viruses.
Common internet threats to be aware of:
2. SPAM- one of the most common methods of both sending information out and collecting
it from unsuspecting people. The mass distribution of unsolicited messages, advertising or
pornography to addresses which can be easily found on the Internet through things like social
networking sites, company websites and personal blogs.
3. PHISHING – commonly used by cyber criminals because it's easy to execute and can
produce the results they're looking for with very little effort. Fake emails, text messages and
websites created to look like they're from authentic companies. They're sent by criminals to
steal personal and financial information from you. This is also known as “spoofing”.
4. CYBER BULLYING - is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in
social media, forums, or gaming where people can view, participate in, or share content.
4
5 6
7
“Contextualized Online Search
and Research Skills”
Internet research is the practice of using
Internet information, especially free
information on the World Wide Web, in
research. It has a profound impact on the way
ideas are formed and knowledge is created.
Common applications of Internet research
include personal research on a particular subject
(something mentioned on the news, a health
problem, etc.), students doing research for
academic projects and papers, and journalists
and other writers researching stories.
Activity No. 2.3: Online Researching
Look at these two search results.
Write a summary of the difference between the
two results in a separate sheet of paper.
Post your answers in the “Activities for Lesson 2 –
L2: Activity 2.3” via text reply.
Figure 2.0
Figure 1.0
Tips in conducting online research:
•Have a question in mind. Focus on a question you want answered. If it is a series
of questions, start with one. Never search everything in one go.
•Narrow it down. Search engines use several filters to determine the most
appropriate result for you. These search engines use your previous search history
and your geographical location, and send you which is the most related to you. You
should always remember to narrow down what you are searching for.
•Advanced Search. The best way to filter information you get from search engines
is by using the advanced search. This will allow you to filter out information you do
not need.
•Look for a credible source. Click the source of the information and see if it is
credible.
•Give credit. If you are going to use the information from a source for educational
purposes, give credit to the original author of the page or information. To properly
cite a reference, you may use the format below:
Example
Name of the person or organization (the author of the information). Title of the home page in italics
(title is shown in title bar but is sometimes missing or unrelated). URL. Date last seen.